Sciweavers

1499 search results - page 4 / 300
» Case Study: An Implementation of a Secure Steganographic Sys...
Sort
View
HICSS
2009
IEEE
124views Biometrics» more  HICSS 2009»
14 years 2 months ago
Case Studies of an Insider Framework
Many groups are interested in the insider threat problem, but the model generally used by all of these groups is implicitly binary—one is either within a perimeter or not. There...
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whal...
ECIS
2001
13 years 8 months ago
Why information systems plans do not get implemented: A case study of a UK hospital
The progression of implementation of an information systems strategy in a UK acute hospital is described. The case study describes the IS strategy, the conditions that led to its ...
Neil McBride, Ray Hackney
AAI
2000
182views more  AAI 2000»
13 years 7 months ago
Implementing a Business Process Management System Using ADEPT: A Real-World Case Study
: This paper describes how ADEPT's agent-based design and implementation philosophy was used to prototype a business process management system for a real-world application. Th...
Nicholas R. Jennings, Peyman Faratin, Timothy J. N...